Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yuewei Dai is active.

Publication


Featured researches published by Yuewei Dai.


Signal Processing | 2008

Locally optimum detection for Barni's multiplicative watermarking in DWT domain

Jinwei Wang; Guangjie Liu; Yuewei Dai; Jinsheng Sun; Zhiquan Wang; Shiguo Lian

With the increasing demands of copyright protection, watermarking technology has being paid more and more attention. In the design of watermarking algorithm, a good watermark detection scheme can improve the successful detection rate, which pushes more and more researchers to work on optimum detectors. In this paper, with respect to Barnis multiplicative watermarking that is based on human visual system (HVS), the optimum detection using Bayesian decision rule is firstly proposed. The decision threshold is obtained by the NP criterion. The probability density function of the transform coefficients is modeled by using the generalized Gaussian distribution. Its simplification equation is given using Gaussian distribution. It can result in a better performance than correlation detection.


international conference on multimedia information networking and security | 2009

Detection of Image Region Duplication Forgery Using Model with Circle Block

Junwen Wang; Guangjie Liu; Hongyuan Li; Yuewei Dai; Zhiquan Wang

Due to the widespread use of sophisticated imaging tools, digital image forgeries have already become a serious social problem. In this paper, we proposes an efficient and robust algorithm for detection of a specific category of digital image forgery known as region duplication forgery, which is done by copying a block of an image and pasting it on to some other block of the same image. The image is first reduced in dimension by Gaussian pyramid, and four features are adopted for each circle block. The feature vectors are lexicographically sorted. Then similar vectors will be matched by a certain threshold value. Finally, the area threshold value is proposed to remove the wrong similar blocks. Experimental results show that our method is robust to not only the post processing including noise adding, blurring, lossy compression, but also the copy region rotation. Meanwhile, the proposed method reduces the total number of blocks to narrow block-matching searching space, which can improve the efficiency comparing with the exiting methods.


international conference on control, automation, robotics and vision | 2004

A fast video encryption scheme based-on chaos

Shiguo Lian; Jinsheng Sun; Zhiquan Wang; Yuewei Dai

Video encryption is a suitable method to protect video data. There are some disadvantages in the algorithms proposed before. In this paper, we propose a novel fast MPEG video encryption algorithm, which encrypts run length codes with chaotic run-length encryption algorithm (CREA), encrypts the signs of motion vectors with security-enhanced chaotic stream cipher (SECSC) and distributes keys with chaotic key distributor (CKD) at the same time. Its security, compression ratio and computational complexity are analyzed in details. Experimental results show that, the algorithm has less effect on compression ratio than the algorithms confusing DCT coefficients do, does not change file format, and is of low cost. Thus, it is suitable for secure video encoding with real-time requirement.


Mathematical and Computer Modelling | 2013

Detect image splicing with artificial blurred boundary

Guangjie Liu; Junwen Wang; Shiguo Lian; Yuewei Dai

Abstract In this paper, a novel method is proposed to detect image splicing with artificial blurred boundary based on image edge analysis and blur detection. Different from existing algorithms, the image edges are divided into three types based on the coefficients of the non-subsampled contourlet transform. And, the six-dimensional feature of each edge point is extracted, which is composed of two non-subsampled contourlet coefficients and four statistics based on the phase congruency. Then, three support vector machines for each edge type are trained and used to detect the blurred edge points. And, the local feature is defined to distinguish artificial blurred edge points from defocus ones. The proposed method can be used to detect either the image blur or the image splicing with artificial blurred boundary, and it is shown by experimental results.


international conference on multimedia information networking and security | 2011

An Adaptive Matrix Embedding for Image Steganography

Guangjie Liu; Weiwei Liu; Yuewei Dai; Shiguo Lian

In this paper, an adaptive matrix embedding method is proposed for grayscale images. The 2×4 pixel block is taken as a cover unit. The local correlation of the block is used to determine the message bit amount and choose the corresponding matrix embedding strategy. The method can embed less in image parts with high local correlation and more in image parts with low local correlation. The experimental results indicate that the new method improves the PSNR value greatly. And the new method is secure against the traditional steganalytic method.


Telecommunication Systems | 2012

Network covert timing channel with distribution matching

Guangjie Liu; Jiangtao Zhai; Yuewei Dai

Network covert timing channel is a communication fashion that modifies the timing properties of network traffic to transfer secret information. It is designed to carry out the reliable and undetectable transmission. In this paper, a simple and secure covert timing channel method with distribution matching is proposed. The approach treats the network traffic as the flow with the fixed-length fragment, and calculates the histogram of the packet delays in each fragment. The message bits are modulated into the delays by the binary coding method, and the histogram is kept almost unchanged by assigning the matched distribution. The bit error rates are analyzed and two detection experiments are performed. The results show the proposed method is reliable and undetectable.


international conference on multimedia information networking and security | 2010

Image Forgery Forensics Based on Manual Blurred Edge Detection

Junwen Wang; Guangjie Liu; Hongyuan Li; Yuewei Dai; Zhiquan Wang

In this paper, a novel image forensics method is proposed to detect manual blurred edges from a tampered image. Firstly, the image edges are analyzed by using non-subsampled contourlet transform. Then the differences between the normal edge and the blurred edge are extracted by researching phase congruency and prediction-error image. After that, the features are used to train the SVM, by which the blurred edges can be distinguished. Finally, the local definition is introduced to indicate the differences between the manual blur and defocus ones. Experimental results show that this method can detect possible blurring in images and locate the tampering boundary with a relative high accurate rate.


Journal of Multimedia | 2010

Improved LSB-matching Steganography for Preserving Second-order Statistics

Guangjie Liu; Zhan Zhang; Yuewei Dai; Shiguo Lian

In the paper, for enhancing the security of the traditional LSB matching, two improved LSB-matching methods are proposed. In the steganograhical procedure, the Markov chain distance based on the second-order statistics is chosen as the security metric to control the modification directions of ±1 embedding. The first method is based on stochastic modification, which directly determines the modification directions by the empirical Markov transition matrix of a cover image and the pseudorandom number generated by a pseudorandom number generator. The second one is based on genetic algorithm, which is used to find the optimum matching vector to make the security metric as small as possible. Experiments show the proposed algorithms outperform LSB matching and LSB replacement in a sense of the firstorder and second-order security metrics. And the adjacent calibrated COM-HCF steganalytical tests also show that the two algorithms are more secure than the traditional ones.


Security and Communication Networks | 2011

Identity-based multi-receiver threshold signcryption scheme

Huawang Qin; Yuewei Dai; Zhiquan Wang

An identity-based threshold signcryption scheme for multiple receivers is proposed. For the n specified receivers, the ciphertext can be decrypted and verified when arbitrary t or more receivers work together. The steps of the private keys extraction, the signcryption, the decryption, and the verification are introduced in detail. The chosen-ciphertext security of the scheme is proved formally. The comparisons to the existing schemes show that the proposed scheme is more secure, more flexible, and the simulative game of the security proof in the scheme is more perfect. Copyright


international conference on multimedia information networking and security | 2010

A Covert Channel Detection Algorithm Based on TCP Markov Model

Jiangtao Zhai; Guangjie Liu; Yuewei Dai

Covert channels are used for transmitting secret information, which can penetrate the existing security equipments and bring potential dangers up to the information security. So, it’s very essential to develop the correspondent detection algorithms. In the paper, the potential redundancies in TCP protocol are analyzed, and the covert channel algorithms are divided into several kinds according to TCP protocol. And then, a new covert channel detection method is proposed based on the TCP Markov model for different application scenarios. Experiments show that the proposed algorithm achieves sound detection performance.

Collaboration


Dive into the Yuewei Dai's collaboration.

Top Co-Authors

Avatar

Guangjie Liu

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zhiquan Wang

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Huawang Qin

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Weiwei Liu

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jinwei Wang

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hongyuan Li

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jiangtao Zhai

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Junwen Wang

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaohua Zhu

Nanjing University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge